@techreport{ietf-cat-kerb-key-derivation-00, number = {draft-ietf-cat-kerb-key-derivation-00}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-ietf-cat-kerb-key-derivation/00/}, author = {Marc Horowitz}, title = {{Key Derivation for Kerberos V5}}, pagetotal = 4, year = 1996, month = nov, day = 27, abstract = {In the Kerberos protocol {[}RFC1510{]}, cryptographic keys are used in a number of places. In order to minimize the effect of compromising a key, it is desirable to use a different key for each of these places. Key derivation {[}Horowitz96{]} can be used to construct different keys for each operation from the keys transported on the network. For this to be possible, a small change to the specification is necessary.}, }